Identity-Based Data Auditing Scheme With Provable Security in the Standard Model Suitable for Cloud Storage

被引:1
|
作者
Deng, Lunzhi [1 ]
Feng, Shuai [1 ]
Wang, Tao [1 ]
Hu, Zhenyu [1 ]
Li, Siwei [2 ]
机构
[1] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Guizhou Normal Univ, Grad Sch, Guiyang 550001, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; data auditing; identity-based cryptography; standard model; DATA POSSESSION; EFFICIENT; CHECKING;
D O I
10.1109/TDSC.2023.3336994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a data auditing scheme, the data owner authorizes a third-party auditor (TPA) to check whether the data stored in the cloud remains intact. Researchers have given many data auditing schemes. However, there are still three significant shortcomings in these schemes. First of all, the security proofs of these schemes are completed in the random oracle model (ROM). As we all know, a scheme with provably security in ROM may be insecure in practical applications. Second, TPA in most known schemes is set to be completely reliable. However, TPA in reality may attempt to extract the data owner's data. These schemes cannot resist the malicious behavior of TPA. Third, most known schemes require hash-to-point operations and enjoy high computation cost, so they are not suitable for computing-constrained environments. In this article, we first presented the system model and security demands for an identity-based data auditing (IBDA) scheme. We then came up with a new IBDA scheme and showed the security proofs in the standard model (SM). Finally, we made an analysis on performance for seven data auditing schemes. In our scheme, the computation cost required by TPA is a constant, independent of the number of data blocks participating in the challenge. Therefore, our scheme requires low computation cost and is suitable for computing-constrained environments.
引用
收藏
页码:3644 / 3655
页数:12
相关论文
共 50 条
  • [21] Identity-based non-repudiable dynamic provable data possession in cloud storage
    Wang, Feng
    Xu, Li
    Wang, Huaqun
    Chen, Zhide
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 521 - 533
  • [22] An Efficient Auditing Scheme for Data Storage Security in Cloud
    Agarkhed, Jayashree
    Ashalatha, R.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [23] An efficient provable security identity-based proxy aggregate signature scheme
    Guo, Lei
    Hu, Defa
    International Journal of Applied Mathematics and Statistics, 2013, 51 (23): : 212 - 222
  • [24] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [25] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [26] An Identity-Based Blind Signature Scheme Using Lattice with Provable Security
    Li, Quanrun
    Hsu, Chingfang
    He, Debiao
    Choo, Kim-Kwang Raymond
    Gong, Peng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [27] An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems
    Li, Xiong
    Shang, Shuai
    Liu, Shanpeng
    Gu, Ke
    Jan, Mian Ahmad
    Zhang, Xiaosong
    Khan, Fazlullah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2556 - 2567
  • [28] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445
  • [29] Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
    Nithya, S. Mary Virgil
    Uthariaraj, V. Rhymend
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [30] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844